Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Physical Sciences and Mathematics

Stochastic Models Of Jaya And Semi-Steady-State Jaya Algorithms, Uday Chakraborty Jan 2022

Stochastic Models Of Jaya And Semi-Steady-State Jaya Algorithms, Uday Chakraborty

Computer Science Faculty Works

The Jaya algorithm and its variants have enjoyed great success in diverse application areas, but no theoretical analysis of the algorithm, to our knowledge, is available in the literature. In this paper we build stochastic models for analyzing Jaya and semi-steady-state Jaya algorithms. For these algorithms, the computational cost depends on how, at each iteration, the new individual fares against the existing individual. Costs must be incurred for any replacement of individuals and the subsequent update of the population-worst individual’s (and/or the population-best individual’s) index. We use the following two quantities as the main metrics for analysis: the expected number …


Connecting The Dots: The Boons And Banes Of Network Modeling, Sharlee Climer Dec 2021

Connecting The Dots: The Boons And Banes Of Network Modeling, Sharlee Climer

Computer Science Faculty Works

Network modeling transforms data into a structure of nodes and edges such that edges represent relationships between pairs of objects, then extracts clusters of densely connected nodes in order to capture high-dimensional relationships hidden in the data. This efficient and flexible strategy holds potential for unveiling complex patterns concealed within massive datasets, but standard implementations overlook several key issues that can undermine research efforts. These issues range from data imputation and discretization to correlation metrics, clustering methods, and validation of results. Here, we enumerate these pitfalls and provide practical strategies for alleviating their negative effects. These guidelines increase …


Machine Learning-Based Network Vulnerability Analysis Of Industrial Internet Of Things, Maede Zolanvari, Marcio Teixeira, Lav Gupta, Khaled Khan, Raj Jain Aug 2019

Machine Learning-Based Network Vulnerability Analysis Of Industrial Internet Of Things, Maede Zolanvari, Marcio Teixeira, Lav Gupta, Khaled Khan, Raj Jain

Computer Science Faculty Works

No abstract provided.


[Accepted Article Manuscript Version (Postprint)] Distributed Data-Gathering And -Processing In Smart Cities: An Information-Centric Approach, Reza Tourani, Abderrahmen Mtibaa, Satyajayant Misra Jan 2019

[Accepted Article Manuscript Version (Postprint)] Distributed Data-Gathering And -Processing In Smart Cities: An Information-Centric Approach, Reza Tourani, Abderrahmen Mtibaa, Satyajayant Misra

Computer Science Faculty Works

The technological advancements along with the proliferation of smart and connected devices (things) motivated the exploration of the creation of smart cities aimed at improving the quality of life, economic growth, and efficient resource utilization. Some recent initiatives defined a smart city network as the interconnection of the existing independent and heterogeneous networks and the infrastructure. However, considering the heterogeneity of the devices, communication technologies, network protocols, and platforms the interoperability of these networks is a challenge requiring more attention. In this paper, we propose the design of a novel Information-Centric Smart City architecture (iSmart), focusing on the demand of …


Distributed Data-Gathering And -Processing In Smart Cities: An Information-Centric Approach, Reza Tourani, Abderrahmen Mtibaa, Satyajayant Misra Jan 2019

Distributed Data-Gathering And -Processing In Smart Cities: An Information-Centric Approach, Reza Tourani, Abderrahmen Mtibaa, Satyajayant Misra

Computer Science Faculty Works

The technological advancements along with the proliferation of smart and connected devices (things) motivated the exploration of the creation of smart cities aimed at improving the quality of life, economic growth, and efficient resource utilization. Some recent initiatives defined a smart city network as the interconnection of the existing independent and heterogeneous networks and the infrastructure. However, considering the heterogeneity of the devices, communication technologies, network protocols, and platforms the interoperability of these networks is a challenge requiring more attention. In this paper, we propose the design of a novel Information-Centric Smart City architecture (iSmart), focusing on the demand of …


A Truthful Auction Mechanism For Mobile Crowd Sensing With Budget Constraint, Yuanni Liu, Xiaodan Xu, Jianli Pan, Jianhui Zhang, Guofeng Zhao Jan 2019

A Truthful Auction Mechanism For Mobile Crowd Sensing With Budget Constraint, Yuanni Liu, Xiaodan Xu, Jianli Pan, Jianhui Zhang, Guofeng Zhao

Computer Science Faculty Works

The selfishness and randomness of users in the mobile crowd sensing network could cause them unwilling to participate in sensing activities and lead to lower completion rates of sensing tasks. In order to deal with these problems, this paper proposes a novel incentive mechanism based on a new auction model for mobile crowd sensing, which consists of two consecutive stages. In the first stage, a novel Incentive Method based on Reverse Auction for Location-aware sensing (IMRAL) is proposed to maximize user utility. By introducing a task-centric method to determine the winning bids, it can provide higher user utility and higher …


Correction: A Novel Variant In Cmah Is Associated With Blood Type Ab In Ragdoll Cats, Badri Adhikari Mar 2018

Correction: A Novel Variant In Cmah Is Associated With Blood Type Ab In Ragdoll Cats, Badri Adhikari

Computer Science Faculty Works

No abstract provided.


Dynamic Technology Challenges Static Codes Of Ethics, Bo Brinkman, Catherine Flick, Don Gotterbarn, Keith Miller, Kate Vazansky, Marty J. Wolf Oct 2017

Dynamic Technology Challenges Static Codes Of Ethics, Bo Brinkman, Catherine Flick, Don Gotterbarn, Keith Miller, Kate Vazansky, Marty J. Wolf

Computer Science Faculty Works

We describe the process of changing and the changes being suggested for the ACM Code of Ethics and Professional Conduct. In addition to addressing the technical and ethical basis for the proposed changes, we identify suggestions that commenters made in response to the first draft. We invite feedback on the proposed changes and on the suggestions that commenters made.


Detecting And Tracking Attacks In Mobile Edge Computing Platforms, Abderrahmen Mtibaa, Khaled A. Harras, Hussein Alnuweiri Mar 2016

Detecting And Tracking Attacks In Mobile Edge Computing Platforms, Abderrahmen Mtibaa, Khaled A. Harras, Hussein Alnuweiri

Computer Science Faculty Works

Device-to-device (d2d) communication has emerged as a solution that promises high bit rates, low delay and low energy consumption which represents the key for novel technologies such as Google Glass, S Beam, and LTE-Direct. Such d2d communication has enabled computational offloading among collaborative mobile devices for a multitude of purposes such as reducing the overall energy, ensuring resource balancing across device, reducing the execution time, or simply executing applications whose computing requirements transcend what can be accomplished on a single device. While this novel computation platform has offered convenience and multiple other advantages, it obviously enables new security challenges and …


Ieee Access Special Section Editorial: Recent Advances In Software Defined Networking For 5g Networks, Mugen Peng, Tao Huang, Y. Richard Yu, Jianli Pan Jan 2015

Ieee Access Special Section Editorial: Recent Advances In Software Defined Networking For 5g Networks, Mugen Peng, Tao Huang, Y. Richard Yu, Jianli Pan

Computer Science Faculty Works

No abstract provided.


[Accepted Article Manuscript Version (Postprint)] Track Me To Track Us: Leveraging Short Range Wireless Technologies For Enabling Energy Efficient Wi-Fi-Based Localization, Mohamed Abdellatif, Abderrahmen Mtibaa, Khaled Harras Oct 2012

[Accepted Article Manuscript Version (Postprint)] Track Me To Track Us: Leveraging Short Range Wireless Technologies For Enabling Energy Efficient Wi-Fi-Based Localization, Mohamed Abdellatif, Abderrahmen Mtibaa, Khaled Harras

Computer Science Faculty Works

Given the success of outdoor tracking via GPS and the rise of real-time context-aware services, users will soon rely on applications that require higher granularity indoor localization. This need is further manifested in countries like Qatar, where various social and business activities occur indoors. Wi-Fi-based indoor localization is one of the most researched techniques due to its ubiquitous deployment and acceptable accuracy for a wide range of applications. However, we do not witness such techniques widely deployed mainly due to their high demand on energy, which is a precious commodity in mobile devices. We propose an energy-efficient indoor localization system …


Towards Node Cooperation In Mobile Opportunistic Networks, Abderrahmen Mtibaa, Khaled Harras Dec 2011

Towards Node Cooperation In Mobile Opportunistic Networks, Abderrahmen Mtibaa, Khaled Harras

Computer Science Faculty Works

Mobile devices such as smart-phones and tablets are becoming ubiquitous, with ever increasing communication capabilities. In situations where the necessary infrastructure is unavailable, costly, or overloaded, opportunistically connecting theses devices becomes a challenging area of research. Data is disseminated using nodes that store-carry-and-forward messages across the network. In such networks, node cooperation is fundamental for the message delivery process. Therefore, the lack of node cooperation (e.g., a node may refuse to act as a relay and settle for sending and receiving its own data) causes considerable degradation in the network. In order to ensure node cooperation in such networks, we …


Paranets: A Parallel Network Architecture For The Future Internet, Khaled Harras, Abderrahmen Mtibaa Dec 2010

Paranets: A Parallel Network Architecture For The Future Internet, Khaled Harras, Abderrahmen Mtibaa

Computer Science Faculty Works

The evolution of networking technologies and portable devices has led users to expect connectivity anytime and everywhere. We have reached the point of seeing networking occur underwater, via aerial devices, and across space. While researchers push the true boundaries of networking to serve a wide range of environments, there is the challenge of providing robust network connectivity beyond the boundaries of the core internet, defined by fiber optics and well-organized backbones. As the internet edges expand, the expectation is that connectivity will be as good, in terms of high bandwidth and minimal interruption, as anywhere in the core. Such an …


Software Test Automation, Phillip Laplante, Fevzi Belli, Jerry Gao, Greg Kapfhammer, Keith Miller, W. Eric Wong, Dianxiang Xu Jan 2010

Software Test Automation, Phillip Laplante, Fevzi Belli, Jerry Gao, Greg Kapfhammer, Keith Miller, W. Eric Wong, Dianxiang Xu

Computer Science Faculty Works

No abstract provided.


Review Of Information Technology And Moral Philosophy, Keith Miller, Bethany Spielman Feb 2009

Review Of Information Technology And Moral Philosophy, Keith Miller, Bethany Spielman

Computer Science Faculty Works

No abstract provided.